QUESTION 366You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.L2P.com has a server, named L2P-SR13. L2P-SR13 hosts a shared folder, named L2PShare, which has been shared as L2PShare$.Which of the following is TRUE with regards to sharing the folder in this manner?

A. It allows all users to view L2PShare when browsing the network.B. It prevents users from viewing L2PShare when browsing the network.C. It only allows L2P-SR13’s users to view L2PShare.D. It removes the permissions configured for L2PShare.

Answer: BExplanation:A hidden share is identified by a dollar sign ($) at the end of the share nameHidden shares are not listed when you look through the shares on a computer or use the “net view” commandWhy Use Hidden Shares? Using hidden shares on your network is useful if you do not want a shared folder or drive on the network to be easily accessible. Hidden shares can add another layer of protection for shared files against unauthorized people connecting to your network. Using hidden shares helps eliminate the chance for people to guess your password (or be logged into an authorized Windows account) and then receive access to the shared resource.

QUESTION 367You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing printer pooling.Which of the following is TRUE with regards to printer pooling? (Choose all that apply.)

A. Printers in a pool must be of the same model, and use the same printer driver.B. Each printer in the pool must have a different printer driver.C. Printer ports used in the pool must be of the same type.D. The types of printer ports used in the pool must be mixed.E. Pooled printers appear to workstations as a single printer.F. A minimum of three printers are required to configure a printer pool.

Answer: AEExplanation:You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the samelogical printer on a server.http://technet.microsoft.com/en-us/library/cc757086%28v=ws.10%29.aspx

QUESTION 368You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have installed the DNS Server Role on a ABC.com server, named ABC-SR13. ABC.com’s workstations make use of a web proxy to access the Internet, and refer to ABC-SR13 as a primary DNS server.You have been instructed to make sure that Internet host names for ABC.com’s workstations are not resolved by ABC-SR13.Which of the following actions should you take?

A. You should consider configuring a primary zone on L2P-SR13.B. You should consider configuring a secondary zone on L2P-SR13.C. You should consider configuring a reverse lookup zone on L2P-SR13.D. You should consider configuring a forward lookup zone on L2P-SR13.

Answer: AExplanation:Open DNS Server Manager | Expand DNS Server | Expand Forward Lookup Zones | Right Click on Forward Lookup Zones and select New Zone | Primary Zone | Zone Name: “.” (only dot, without quotation marks) When you create such a zone, you are configuring the DNS server to be the ultimate authority for the DNS namespace. The DNS server will no longer attempt to forward any DNS requests that it is not authoritative for.When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or roothint servers.Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (“”), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs).

There is a fair bit of confusion around the purpose of the Alternate DNS Server. This Post should hopefully put these questions to bed.The general assumption is that, the Windows DNS Client on all counts, will send a DNS query to the Preferred DNS first. If this query fails, then it will query the Alternate DNS Server, and so on and so forth.The above statement is true, however there is a twist.The Windows DNS Client will reset the DNS Server Priority at periodic intervals. By default, the server priorities are reset every 15 minutes.Let’s look at an example:I have a DNS Client configured as follows:Preferred DNS: 192.168.0.1Alternate DNS: 10.10.0.1The DNS Client will start by sending queries to 192.168.0.1. After 15 minutes it will switch priority to 10.10.0.1. Thus all queries will first be sent to 10.10.0.1 for a period of 15 minutes before switching back to 192.168.0.1There is another condition that triggers a Priority Switch.If say the Preferred DNS timed out on a DNS query, the DNS Client will send that DNS Query to the Alternate DNS.If the Alternate DNS resolves the Query, the Priority will now switch to the Alternate DNS, until either it times out on a Query or the Priority Time Limit expires.It is a common practice to configure the Preferred DNS Server with the IP of a Local Site DNS Server and the Alternate DNS Server with that of a Remote Site. The problem arises when Firewall/Network folk raise complaints that Clients are sending DNS Traffic to Remote DNS Servers. Well, that is because they have been configured to do so.http://blogs.technet.com/b/ajayr/archive/2011/12/14/who-does-dns-client-prefer-preferred-or-alternate.aspxhttp://technet.microsoft.com/en-us/library/cc738344%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/jj590768.aspx

QUESTION 370Command to set configure network interface primary dns server. Note: Other config such as ip address should not be changed.

QUESTION 371A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice.The server team would like four of the servers to include the Windows 8 Shell. Which installation option is required for these servers?

Answer: BExplanation:The Desktop Experience installation option includes the Windows 8 Shell feature. This installation option also includes other features available for installation not found in the other three; such as Themes, Windows Store and support for Windows Store apps, and Windows Media Player.Quick Tip: To completely remove a feature and the binary files from the disk, use the Windows PowerShell command Uninstall-WindowsFeature. For example, to remove Desktop Experience:Uninstall-WindowsFeature Desktop-Experience -Removehttp://technet.microsoft.com/en-us/library/hh831786.aspxhttp://mcpmag.com/articles/2013/01/22/70-410-win2012-install.aspx

QUESTION 372A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network.Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server?

A. ReservationB. Scope optionsC. NAPD. Scope properties

Answer: AExplanation:Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address.Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range.Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices.http://technet.microsoft.com/en-us/library/jj200226.aspxhttp://mcpmag.com/articles/2013/02/12/70-410-dhcp.aspxAnother correct answer? Create a Exclusion Range? You decide… but that option is not at the options list at this question.

QUESTION 373A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems.Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports?

QUESTION 374A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell.Which Windows PowerShell module includes the command-line options for installing domain controllers?

QUESTION 375A company’s server administration team would like to take advantage of the newest file systems available with Windows Server 2012 R2. The team needs a file system capable of managing extremely large data drives that can auto-detect data corruption and automatically perform needed repairs without taking a volume offline.Which file system should the server administration team choose?

A. NFSB. DFSC. NTFSD. ReFS

Answer: DExplanation:The ReFS (Resilient File System) is capable of managing extremely large data drives (1 YB Yottabyte), can auto-detect data corruption, and automatically perform needed repairs without taking the volume offline.Quick Tip: The command fsutil fsinfo volumeinfo x: will display the volume file system. ReFS is only intended for data drives and not compatible with all Windows Server 2012 R2 file system technologies, however it is compatible with the new Storage Spaces.http://technet.microsoft.com/en-us/library/hh831724.aspxhttp://mcpmag.com/articles/2013/01/29/70-410-win2012-file.aspx

QUESTION 376A company’s server security team needs a solution that will prevent users from installing and using unauthorized applications on their Windows 8 desktop computers. Which technology should the team choose?

QUESTION 376You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. Which of the following could possibly be causes for the failure? (Choose all answers that are correct.)

A. There are still members in the group.B. One of the group’s members has the group set as its primary group.C. You do not have the proper permissions for the container in which the group is located.D. You cannot delete global groups from the Active Directory Users and Computers console.

Answer: BCExplanation:A. Incorrect: It is possible to delete a group that has members. B. Correct: If any member sets the group as its primary group, then the system does not permit the group to be deleted.C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is located to delete it.D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console.

QUESTION 377In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can members of a global group? (Choose all answers that are correct.)

A. UsersB. ComputersC. Universal groupsD. Global groups

Answer: ABDExplanation:A. Correct: Users can be security principals in a global group. B. Correct: Computers can be security principals in a global group. C. Incorrect: Universal groups cannot be security principals in a global group. D. Correct: Global group can be security principals in a global group.

QUESTION 378Which of the following group scope modifications are never permitted? (Choose all answers that are correct.)

A. Global to universalB. Global to domain localC. Universal to globalD. Domain local to universal

Answer: BExplanation:A. Incorrect: Global to universal group conversions are sometimes permitted. B. Correct: Global to domain local group conversions are never permitted. C. Incorrect: Universal to global group conversions are sometimes permitted. D. Incorrect: Domain local to universal group conversions are sometimes permitted.

QUESTION 379Which of the following is not a correct reason for creating an OU?

A. To create a permanent container that cannot be moved or renamedB. To duplicate the divisions in your organizationC. To delegate administration tasksD. To assign different Group Policy settings to a specific group of users or computers

Answer: AExplanation:A. Correct: The reasons for creating an OU include duplicating organizational divisions, assigning Group Policy settings, and delegating administration. You can easily move or rename an OU at will. B. Incorrect: Duplicating organizational divisions is a viable reason for creating an OU. C. Incorrect: Delegating administration tasks is a viable reason for creating an OU. D. Incorrect: Assigning Group Policy settings is a viable reason for creating an OU.

QUESTION 380Which of the following groups do you use to consolidate groups and accounts that either span multiple domains or the entire forest?

A. GlobalB. Domain localC. Built-inD. Universal

Answer: DExplanation:A. Incorrect: Global groups cannot contain users from other domains. B. Incorrect: Domain local groups cannot have permissions for resources in other domains. C. Incorrect: Built-in groups have no inherent cross-domain qualities. D. Correct: Universal groups, like global groups, are used to organize users according to their resource access needs. You can use them to organize users to facilitate access to any resource located in any domain in the forest through the use of domain local groups. Universal groups are used to consolidate groups and accounts that either span multiple domains or the entire forest.

☆ 100% Pass Guaranteed Or Full Money Back!☆ Instant Download Access After Payment!☆ One Year Free Updation!☆ Well Formated: PDF,VCE,Exam Software!☆ Multi-Platform capabilities – Windows, Laptop, Mac, Android, iPhone, iPod, iPad.☆ Professional, Quick,Patient IT Expert Team 24/7/365 Onlinen Help You!☆ We served more than 35,000 customers all around the world in last 5 years with 98.99% PASS RATE!☆ Guaranteed Secure Shopping! Your Transcations are protected by Braindump2go all the time!☆ Pass any exams at the FIRST try!